Analysis

  • max time kernel
    1795s
  • max time network
    1602s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-02-2024 15:36

General

  • Target

    x64/peview.exe

  • Size

    229KB

  • MD5

    dde1f44789cd50c1f034042d337deae3

  • SHA1

    e7e494bfadb3d6cd221f19498c030c3898d0ef73

  • SHA256

    4259e53d48a3fed947f561ff04c7f94446bedd64c87f52400b2cb47a77666aaa

  • SHA512

    33060b907c4bc2335328498aac832790f7bc43281788fa51f9226a254f2e4dbd0a73b230d54c2cde499b2f2e252b785a27c9159fc5067018425a9b9dbcdbedbc

  • SSDEEP

    3072:/U30KmLQQMpQZxRjsMUni4nuWKz+OHPKVgW9G0tpLmSlbJY/i:/UbmEQMp4TVtW0+Ovh

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 20 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\x64\peview.exe
    "C:\Users\Admin\AppData\Local\Temp\x64\peview.exe"
    1⤵
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:4796
  • C:\Windows\system32\rundll32.exe
    "C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe
    1⤵
      PID:3128
    • C:\Windows\System32\svchost.exe
      C:\Windows\System32\svchost.exe -k UnistackSvcGroup
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:4340

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Comms\UnistoreDB\store.jfm

      Filesize

      16KB

      MD5

      3607d17b02601ca623f56ecfbc266309

      SHA1

      d883f76592633be88b312d8ad12c5fe19841bbea

      SHA256

      9df675d96a5e9c21413992e05a143fc48b61054c2f5b7811ab9825acc6612942

      SHA512

      51952a685b2afb97fae7e36390c7584f18cbfc865a6652667a07edafe70c4d073e22e2816e3215e1b0758e5e0b6ce833a9f2732dbe836109a35d1933dc72dc14

    • memory/4340-41-0x000002DCE6850000-0x000002DCE6851000-memory.dmp

      Filesize

      4KB

    • memory/4340-34-0x000002DCE6850000-0x000002DCE6851000-memory.dmp

      Filesize

      4KB

    • memory/4340-43-0x000002DCE6850000-0x000002DCE6851000-memory.dmp

      Filesize

      4KB

    • memory/4340-35-0x000002DCE6850000-0x000002DCE6851000-memory.dmp

      Filesize

      4KB

    • memory/4340-36-0x000002DCE6850000-0x000002DCE6851000-memory.dmp

      Filesize

      4KB

    • memory/4340-37-0x000002DCE6850000-0x000002DCE6851000-memory.dmp

      Filesize

      4KB

    • memory/4340-38-0x000002DCE6850000-0x000002DCE6851000-memory.dmp

      Filesize

      4KB

    • memory/4340-39-0x000002DCE6850000-0x000002DCE6851000-memory.dmp

      Filesize

      4KB

    • memory/4340-44-0x000002DCE6470000-0x000002DCE6471000-memory.dmp

      Filesize

      4KB

    • memory/4340-1-0x000002DCDE140000-0x000002DCDE150000-memory.dmp

      Filesize

      64KB

    • memory/4340-69-0x000002DCE66C0000-0x000002DCE66C1000-memory.dmp

      Filesize

      4KB

    • memory/4340-33-0x000002DCE6820000-0x000002DCE6821000-memory.dmp

      Filesize

      4KB

    • memory/4340-40-0x000002DCE6850000-0x000002DCE6851000-memory.dmp

      Filesize

      4KB

    • memory/4340-45-0x000002DCE6460000-0x000002DCE6461000-memory.dmp

      Filesize

      4KB

    • memory/4340-47-0x000002DCE6470000-0x000002DCE6471000-memory.dmp

      Filesize

      4KB

    • memory/4340-50-0x000002DCE6460000-0x000002DCE6461000-memory.dmp

      Filesize

      4KB

    • memory/4340-53-0x000002DCE63A0000-0x000002DCE63A1000-memory.dmp

      Filesize

      4KB

    • memory/4340-17-0x000002DCDE240000-0x000002DCDE250000-memory.dmp

      Filesize

      64KB

    • memory/4340-65-0x000002DCE65A0000-0x000002DCE65A1000-memory.dmp

      Filesize

      4KB

    • memory/4340-67-0x000002DCE65B0000-0x000002DCE65B1000-memory.dmp

      Filesize

      4KB

    • memory/4340-68-0x000002DCE65B0000-0x000002DCE65B1000-memory.dmp

      Filesize

      4KB

    • memory/4340-42-0x000002DCE6850000-0x000002DCE6851000-memory.dmp

      Filesize

      4KB